Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Feature-Chain Based Malware Detection Using Multiple Sequence Alignment of API Call., , , , and . IEICE Trans. Inf. Syst., 99-D (4): 1071-1080 (2016)Constructing an Overlay Using a Shared Object Set for Streaming Services on a P2P Network., and . ICOIN, volume 3090 of Lecture Notes in Computer Science, page 784-792. Springer, (2004)Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks., , , , and . WISA, volume 7690 of Lecture Notes in Computer Science, page 285-295. Springer, (2012)Design of network threat detection and classification based on machine learning on cloud computing., , , , and . Clust. Comput., 22 (Suppl 1): 2341-2350 (2019)A survey of deep learning-based network anomaly detection., , , , , and . Clust. Comput., 22 (Suppl 1): 949-961 (2019)Autonomic management of application workflows on hybrid computing infrastructure., , , , and . Sci. Program., 19 (2-3): 75-89 (2011)Hybrid active learning for non-stationary streaming data with asynchronous labeling., , and . IEEE BigData, page 287-292. IEEE Computer Society, (2015)The Performance of Checkpointing and Replication Schemes for Fault Tolerant Mobile Agent Systems., , , and . SRDS, page 256-261. IEEE Computer Society, (2002)Unsupervised Labeling for Supervised Anomaly Detection in Enterprise and Cloud Networks., , , , , and . CSCloud, page 205-210. IEEE Computer Society, (2017)Providing Fault Tolerance for Peer-to-Peer Streaming Service., , and . HSNMC, volume 2720 of Lecture Notes in Computer Science, page 73-82. Springer, (2003)